In the past years, researchers have been focusingon applying information flow security to web applications.These mechanisms should raise a minimum of false alarmsin order to be applicable to millions of existing web pages. A promising technique to achieve this is secure multi-execution (SME). If a program is already secure, its secure multi-execution produces the same output events; otherwise, this correspondence is intentionally broken in order to preserve security. Thus, there is no way to know if unexpected results are due to bugs or due to semantics changes produced by SME. Moreover, SME provides no guarantees on the relative ordering of output events from different security levels. We argue that these shortcomings limit the applicabili...
Secure Multi-Execution (SME) is a precise and general information flow control mechanism that was cl...
Security monitoring systems have been recognized as a fundamental component of security management, ...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
In the past years, researchers have been focusingon applying information flow security to web applic...
Abstract—In the past years, researchers have been focusing on applying information flow security to ...
Recently, much progress has been made on achieving information-flow security via secure multi-execut...
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher ...
Given the increasingly sensitive data that web applications deal with, a lot of attention has been p...
Secure multi-execution (SME) is a dynamic technique to ensure secure information flow. In a nutshell...
Information Flow Control (IFC) is a collection of techniques for ensuring a no-write-down no-read-up...
International audienceSecure multi-execution (SME) is a dynamic technique to ensure secure informati...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
Abstract. This paper studies how confidentiality properties of multi-threaded programs can be verifi...
Language-based information-flow security has emerged as a promising technology to guarantee confiden...
This paper explores information-flow control for batch-job programs that are allowed to be re-run wi...
Secure Multi-Execution (SME) is a precise and general information flow control mechanism that was cl...
Security monitoring systems have been recognized as a fundamental component of security management, ...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...
In the past years, researchers have been focusingon applying information flow security to web applic...
Abstract—In the past years, researchers have been focusing on applying information flow security to ...
Recently, much progress has been made on achieving information-flow security via secure multi-execut...
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher ...
Given the increasingly sensitive data that web applications deal with, a lot of attention has been p...
Secure multi-execution (SME) is a dynamic technique to ensure secure information flow. In a nutshell...
Information Flow Control (IFC) is a collection of techniques for ensuring a no-write-down no-read-up...
International audienceSecure multi-execution (SME) is a dynamic technique to ensure secure informati...
This paper studies how confidentiality properties of multi-threaded programs can be verified efficie...
Abstract. This paper studies how confidentiality properties of multi-threaded programs can be verifi...
Language-based information-flow security has emerged as a promising technology to guarantee confiden...
This paper explores information-flow control for batch-job programs that are allowed to be re-run wi...
Secure Multi-Execution (SME) is a precise and general information flow control mechanism that was cl...
Security monitoring systems have been recognized as a fundamental component of security management, ...
Abstract—Controlling confidential information in concurrent systems is difficult, due to covert chan...